跳到主要內容

臺灣博碩士論文加值系統

(100.26.176.111) 您好!臺灣時間:2024/07/16 14:34
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:劉安庭
研究生(外文):An-Ting Liu
論文名稱:基於機密分享的高效率會議金鑰協定
論文名稱(外文):Efficient Conference Key Protocol Based on Secret Sharing
指導教授:黃慧鳳黃慧鳳引用關係
指導教授(外文):Hui-Feng Huang
學位類別:碩士
校院名稱:國立臺中科技大學
系所名稱:資訊工程系碩士班
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2016
畢業學年度:104
語文別:中文
論文頁數:20
中文關鍵詞:會議金鑰行動通訊機密分享
外文關鍵詞:Conference keyMobile communicationSecret sharing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:110
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
科技的演進與技術的快速的成長,讓與會者(Conferees)可透過無線通訊方式隨時隨地進行行動會議。群組成員之間需共享一個共同的一次性會議金鑰,以確保彼此通信的安全。本論文提出一個基於機密分享的安全且可驗證的群組金鑰傳輸協定,並具備完美安全性質(Information-theoretically secure)。參與者(Participants)在建構共同的會議金鑰時,彼此之間不需進行交互協議,可進一步節省通訊成本。除此之外,我們提出的方法不需預先建立公開金鑰密碼系統(Public Key Cryptosystem),非常適合使用在行動通訊環境。

The rapid growth of technological advances has allowed all conferees to hold a mobile conference via wireless communications. A common one-time session key is required for sharing among group members in secure communication. Based on secret sharing, this article proposes a secure authenticated group key transfer protocol. The proposed method could provide information-theoretically secure. Without any interactive protocol among participants are required to construct the common key. It could save on communication overhead. Moreover, the proposed method needs not to establish public key cryptosystems in advanced, it is very suitable for mobile environment.

中文摘要 i
英文摘要 ii
目次 iii
圖目次 iv
第一章 緒論 1
1.1 研究背景 1
1.2 研究目的 2
1.3 論文架構 2
第二章 相關研究探討 3
第三章 基於機密分享的高效率會議金鑰協定 7
3.1 前言 7
3.2 個人密鑰配送階段(Secret Key Issuing Phase) 8
3.3 會議金鑰計算及驗證階段(Conference Key Computation and Verification Phase) 8
3.4 增加/刪除參與者(Adding/Deleting a Participant) 11
第四章 安全性與效能分析 13
4.1 安全性分析(Security Analysis) 13
4.2 效能分析(Performances Analysis) 16
第五章 結 論 17
參考文獻 18



[1]Berkovits, How to Broadcast a Secret, Proceedings Advances in Cryptology-Eurocrypt91, pp. 535-541, 1991.
[2]M. S. Hwang and W.P. Yang, Conference Key Distribution Schemes for Secure Digital Mobile Communications, IEEE J.Select. Areas Commun., vol. 13, pp. 416-420, 1995.
[3]C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly-secure Key Distribution for Dynamic Conferences, in Proc. CRYPTO''92, pp. 471-486, 1992.
[4]C. C. Chang, T.C. Wu, and C.P. Chen, The Design of Conference Key Distribution System, in Proc. CRYPTO''92, pp. 459-466, 1992.
[5]M. S. Hwang, Dynamic Participation in a Secure Conference Scheme for Mobile Communications, IEEE Trans. Veh. Technol., vol. 48, pp. 1469-1474, 1999.
[6]K. F. Hwang and C.C. Chang, A Self-encryption Mechanism for Authentication of Roaming and Teleconference Services, IEEE Trans. Wireless Commun., vol. 2, no. 2, pp. 400-407, 2003.
[7]K. Koyama and K. Ohta, Identity-based Conference Key Distribution System, in Proc. CRYPTO''87, pp. 194-202, 1987.
[8]D.G. Steer, L. Strawczynski, W. Die, and M. Wiener, A Secure Audio Teleconferences System, in Proc. CRYPTO''88, pp. 520-528, 1988.
[9]S.L. Ng, Comments on Dynamic Participation in a Secure Conference Scheme for Mobile Communications, IEEE Trans. Veh. Technol., vol. 50, pp. 334-335, 2001.
[10]G.W. Tzeng, A Secure Fault-tolerant Conference Key Agreement Protocol, IEEE Trans. Computer, vol. 51, pp. 373-379, 2002.
[11]Y.M. Tseng and J.K. Jan, A conference Key Distribution System, Computer Communications, vol. 22, pp. 749-754, 1999.
[12]Z. Wan, F. Bao, R.H. Deng, and A.L. Ananda, Security Analysis on a Conference Scheme for Mobile Communications, IEEE Trans. Wireless Commun., vol. 5, no. 6, pp. 1238-1240, 2006.
[13]X. Yi, C.K. Siew, and C.H. Tan, A Secure and Efficient Conference Scheme for Mobile Communications, IEEE Trans. Veh. Technol., vol. 52, pp. 784-793, 2003.
[14]R.L. Rivest, A. Shamir, and L.M. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, Communications of the ACM, vol. 21, pp. 120-126, Feb. 1978.
[15]H. Mun, K. Han, Y. S. Lee, C. Y. Yeun, and H. H. Choi, “Enhanced secure anonymous authentication scheme for roaming service in global mobility networks”, Mathematical and Computer Modelling, Vol. 55, pp. 214-222, 2012.
[16]N. Koblitz, “Elliptic Curve Cryptosystems”, Mathematics of Computation, Vol. 48, pp. 203-209, 1987.
[17]A. Shamir, “How to share a secret”, Comm. ACM, Vol. 22. No. 11, pp.612-613, 1979.
[18]L. Harn and C. Lin, “Authenticated group key transfer protocol based on secret sharing”, IEEE Transaction on Computers, Vol. 59, No. 6, pp. 842-846, 2010.
[19]C. Lin, L. Harn, and D. Ye, “Efficient (t,n) secret sharing schemes”, Journal of Systems and Software, Vol. 85, pp. 1325-1332, 2012.
[20]Y. Liu, C. Cheng, J. Cao, and T. Jiang, “An improved authenticated group key transfer protocol based on secret sharing”, IEEE Transaction on Computers, Vol. 62, No. 11, 2013, pp. 2335-2336, 2013.
[21]RFC454 - File Transfer Protocol - meeting announcement and a new proposed document, http://www.faqs.org/rfcs/rfc454.html.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top